Skip to main content

Curated research library of TV news clips regarding the NSA, its oversight and privacy issues, 2009-2014

Click "More / Share / Borrow" for each clip's source context and citation link. HTML5 compatible browser required

Primary curation & research: Robin Chin, Internet Archive TV News Researcher; using TV News Archive service.

Speakers

John Conyers
U.S. Representative, D-Michigan, Judiciary Ranking Member
CSPAN2 06/13/2013
Part 1 Conyers: it is my fear that we are on the verge of becoming a surveillance state, collecting billions of electronic records on law-abiding Americans every single day. a point, the recent disclosure confirmed by the administration that section 215 of the USA
John Conyers
U.S. Representative, D-Michigan, Judiciary Ranking Member
CSPAN2 06/13/2013
Part 2 Conyers: Patriot Act is being used to engage in a nationwide dragnet of telecommunications records. I have along with many of my colleagues both democrats and Republicans alike, have long expressed concern that section 215 fails to impose a meaningful limit on the government's ability to collect this type of information.
John Conyers
U.S. Representative, D-Michigan, Judiciary Ranking Member
CSPAN2 06/13/2013
Part 1 Conyers: If every call is relevant, then the relevant standard we enacted into law has little practical meaning. Another point is that total secrecy in which surveillance operates under the Patriot Act and FISA. This secrecy denies Congress
John Conyers
U.S. Representative, D-Michigan, Judiciary Ranking Member
CSPAN2 06/13/2013
Part 2 Conyers: the opportunity with meaningful oversight and prevents the public from holding its government accountable for its action. I can see that it's a difficult and sensitive issue to resolve. But that is our job.
John Conyers
U.S. Representative, D-Michigan, Judiciary Ranking Member
CSPAN2 06/13/2013
Conyers: Look, the Verizon system -- how can the government collect information on all of the Verizon system if the statute limits the government to those records that are relevant to. If they are relevant, relevant under your interpretation, means that anything and everything goes and that's what you did in the example you just gave me. ( >> the gentleman's time has expired. We're going to be very close to the five-minute rule. It's an excellent question will have to wait for the answer.)
Bobby Scott
Representative, Judiciary Subcommittee on Crime, Terrorism, Homeland Security & Investigations-Ranking Member
CSPAN2 06/13/2013
Rep Scott: We changed it from primary purpose to significant purpose that just opened up the idea, which just opens up the idea that you could have some ulterior motive. Director Mueller: on that particular language and language change, if you’d allow me to get back to you. I’d like to give some thought to that Rep Scott: and so this information that we are getting, can only be used for terrorism. That’s what we’re hearing Director Mueller: Yes, under 215, yes
Mike Rogers
Representative (R-Mich.), Chair, House Select Committee on Intelligence
CSPAN2 06/13/2013
get a declassification of information that I think will allow the American public to better understand it. The second part and I will tell you as strongly as I can the national security agency is not reading Americans e-mail. They are not collecting Americans e-mails by either of these programs. I've heard it repeated by members of Congress and the senate. I have heard it repeated in news outlets. That is absolutely incorrect
Mike Rogers
Representative (R-Mich.), Chair, House Select Committee on Intelligence
CSPAN2 06/13/2013
I think Americans think there is the sweep of data we have about Americans and their conversations. That is not happening in this program.
Edward Snowden
whistleblower
LINKTV 06/13/2013
“And because of that, a new leader will be elected, they’ll flip the switch, say that because of the crisis, because of the dangers that we face in the world, you know, some new and unpredicted threat, we need more authority, we need more power, and there will be nothing the people can do at that point to oppose it, and it’ll be turnkey tyranny.”
Keith Alexander
General, Director of the National Security Agency, Chief of the Central Security Service and Commander of the United States Cyber Command.
CSPAN 06/15/2013
From my perspective, the men and women of Cyber Command and NSA...They do this lawfully. They take compliance oversight, protecting civil liberties and privacy and the security of this nation to their heart every day.
Showing 91 through 100 of 1708